Put a firewall between the machine that is running this and the internet and check outbound connections.

Or run a packet sniffer.

Anything that can hook into the hardware at that level could certainly be used to hijack computers into a botnet. It's comparable to the TDL-rootkit protected malware that made the rounds last year, some of which used custom boot sectors. One of the final things I do before returning a machine that was rooted, if the owner didn't want to format, is 'play with it' for a day or so on my [hardware-firewalled] home network while I sniff packets. Machines that look clean aren't always as clean as they look.

If you had an OEM original and it got infected you really need the original key and possible the correct install CD/DVD.The shop where you bought it from could provide that.Failing all this i would recommend you instal a free copy of one of many Linux CD's/DVD's.I'm sure it's against BBR policy to advise any further.--Paradigm Shift beta test pilot. "Dying to defend one's small piece of suburb...Give me something global...STAT!